Skip to main content

Posts

Showing posts with the label Technology

Cloud Computing and data storage terminology glossary

1. Control Plane  The control plane provides management and orchestration across an organization's cloud environment. This is where configuration baselines are set, user and role access are provisioned, and applications sit so they can execute with related services. 2. Cloud computing service Types IaaS, PaaS & SaaS Within the cloud deployment models, there are several types of cloud services, including infrastructure, platforms, and software applications. Cloud service models are not mutually exclusive, and you can choose to use more than one in combination or even all of them at once. Here are the three main cloud service models: Infrastructure as a Service (IaaS) IaaS delivers on-demand infrastructure resources, such as compute, storage, networking, and virtualization. With IaaS, the service provider owns and operates the infrastructure, but customers will need to purchase and manage software, such as operating systems, middleware, data, and applications. Platform as a Serv...

𝐅𝐑𝐄𝐄 𝐂𝐨𝐮𝐫𝐬𝐞𝐬 𝐲𝐨𝐮 𝐰𝐢𝐥𝐥 𝐫𝐞𝐠𝐫𝐞𝐭 𝐧𝐨𝐭 𝐭𝐚𝐤𝐢𝐧𝐠 𝐢𝐧 𝟐𝟎𝟐𝟒

1 Introduction Generative Al imp.i384100.net/5gNjVj 2. Generative AI with Large Language Models imp.i384100.net/k0qRez 2 a) React Fundamentals imp.i384100.net/9gYeRW 2 b) Angular: imp.i384100.net/eKWR9r 2 c) SEO: imp.i384100.net/xkGnW5 3. Generative Adversarial Networks (GANs) Specialization imp.i384100.net/DKNLPn 4. Introduction to Artificial Intelligence (AI) imp.i384100.net/QyQKoA 5. AI Engineering imp.i384100.net/9gYeRy 6. Natural Language Processing Specialization imp.i384100.net/rQPgZR 7. Deep Learning Specialization imp.i384100.net/jrL1k5 8. Generative AI for Data Scientists Specialization imp.i384100.net/k0qReN 9. IBM Data Science Professional Certificate imp.i384100.net/AWNK91 10. Introduction to Data Science imp.i384100.net/GmNDek 11. Learn SQL Basics for Data Science imp.i384100.net/Vm54E3 12. Excel for Business imp.i384100.net/g1EojB 13. Python for Everybody imp.i384100.net/B0MKrL 14. Machine Learning Specialization imp.i384100.net/WqkYnM 15. SQL for Data Science imp.i38410...

Grenaro wireless mic unboxing & testing in DSLR iPhone & GoPro ಕನ್ನಡದಲ್ಲಿ

Buy this mic from Amazon - https://amzn.to/41X5FLW 𝐍𝐎𝐓𝐄:* 𝐎𝐩𝐩𝐨/𝐯𝐢𝐯𝐨/𝐱𝐢𝐚𝐨𝐦𝐢/𝐨𝐧𝐞𝐩𝐥𝐮𝐬/𝐫𝐞𝐚𝐥𝐦𝐞 brand mobile phones, if the connection is unsuccessful ,please go to the settings, searching "𝐎𝐓𝐆" - turn on 𝐎𝐓𝐆 power supply. * Some mobile phones in Android system 𝐜𝐚𝐧𝐧𝐨𝐭 𝐮𝐬𝐞 𝐭𝐡𝐞𝐢𝐫 𝐨𝐰𝐧 𝐜𝐚𝐦𝐞𝐫𝐚𝐬 𝐭𝐨 𝐬𝐡𝐨𝐨𝐭 𝐚𝐮𝐝𝐢𝐨, please download "𝐎𝐩𝐞𝐧 𝐂𝐚𝐦𝐞𝐫𝐚" App. If you still face any issues in connecting, you can directly 𝐜𝐨𝐧𝐭𝐚𝐜𝐭 𝐮𝐬. 🎵𝐂𝐎𝐌𝐏𝐀𝐓𝐈𝐁𝐋𝐄 𝐖𝐈𝐓𝐇 𝐌𝐀𝐍𝐘 𝐃𝐄𝐕𝐈𝐂𝐄𝐒 - Grenaro 3 in 1 receiver Compatible for 𝐓𝐲𝐩𝐞-𝐂 𝐀𝐧𝐝𝐫𝐨𝐢𝐝/𝐢𝐏𝐡𝐨𝐧𝐞/𝐂𝐚𝐦𝐞𝐫𝐚𝐬/𝐋𝐚𝐩𝐭𝐨𝐩. Just clip the wireless microphones to your collar and plug the receiver (𝐓𝐲𝐩𝐞-𝐂/𝐋𝐢𝐠𝐡𝐭𝐧𝐢𝐧𝐠/𝟑.𝟓𝐦𝐦 𝐩𝐨𝐫𝐭) on your devices, they will 𝐚𝐮𝐭𝐨𝐦𝐚𝐭𝐢𝐜𝐚𝐥𝐥𝐲 𝐜𝐨𝐧𝐧𝐞𝐜𝐭. Just plug and play directly, APP and Bluetooth are not required. 🎵𝟑-𝐋𝐄𝐕𝐄𝐋 𝐍𝐎𝐈𝐒𝐄 𝐂𝐀𝐍𝐂𝐄𝐋𝐋𝐀𝐓𝐈𝐎𝐍 - ...

15 Best Fundraiser Websites: The Complete List

Every day we see more and more digital trends cropping up in every sector, showing that technology is here to stay. For the nonprofit sector and individual fundraisers, the expansion to the online space has helped fundraising grow to new heights that were once unfathomable. Today, individuals and organizations can effortlessly expand and capitalize using their online networks, all thanks to the growing digital fundraising sphere . Fundraiser websites can be used for personal fundraising to cover medical expenses, tuition costs, or other worthy causes. Similarly, cause-based organizations employ these online solutions to fund their work and continue striving toward their missions. But with so many options to choose from, it can be challenging to decide which fundraiser website to invest in. To give you a headstart, we've put together a list of the 14 best solutions, which we'll explore in-depth: Donately | Best Online Fundraising Website Double the Donation | Top Fundraiser Web...

Difference between Hub Switch Router & Firewall

  Hub Hubs are used to connect multiple devices in a network. They’re less likely to be seen in business or corporate networks than in home networks. Hubs are wired devices and are not as smart as switches or routers. Switches Switches are wired devices that know the addresses of the devices connected to them and route traffic to that port/device rather than retransmitting to all devices. Offering greater efficiency for traffic delivery and improving the overall throughput of data, switches are smarter than hubs but not as smart as routers Router Routers are used to control traffic flow on networks and are often used to connect similar networks and control traffic flow between them. Routers can be wired or wireless and can connect multiple switches. Smarter than hubs and switches, routers determine the most efficient “route” for the traffic to flow across the network. Firewalls Firewalls are essential tools in managing and controlling network traffic and protecting the network. A f...

Netflix strategy on preventing password sharing

Netflix has decided to end the practice of password sharing. Previously, they had encouraged sharing passwords with friends and family, but now they require users to confirm that they live in the same household or purchase their own subscription. To confirm that someone outside the household is using the account, the primary account holder will need to verify their device using a 4-digit code. The device will have access for seven days before requiring another verification.  Netflix considers a household as a location where the account owner and others sharing the account live. They will use IP addresses, device IDs, and account activity to confirm if the user belongs to the household. If the account holder is traveling or connected to the home WiFi, they won't need to verify their device, but they need to connect to the home WiFi once every 31 days.  However, if someone outside the household is using the account, they will be asked to verify and failure to do so may result in...

How to use WMI from a .NET Application

To start with, let us see what is WMI and what it offers. WMI is an acronym for Windows Management Instrumentation, which is basically an interface to the Windows OS system settings, drivers, and parameters. It also allows managing Windows personal computers and servers through it. A .NET developer can use WMI to obtain information about drivers installed on the client machine, verify whether the system is licensed or not, check for hardware configuration and a lot more. Quoting Linus Torvalds, “Talk is cheap. Show me the code”, let’s get to the basics of WMI usage. To get data through WMI, a SQL-like query is used. The specific query type is called WQL (WMI Query Language). Don’t let the name confuse you. It is still very similar to SQL. Before diving into code, you should know that Windows comes with a tool called WMI Test Tool, which lets you test WQL queries, to check their correctness and returned results. It is a bit harder to track wrong query results in code, so this tool can s...

Powercube multi socket adapter by allocacoc review

A very useful utility when you are traveling or at home where you have limited power socket outlets. Powercube multi-socket adapter has 4 number of 3 pin female socket ports & 2 female usb A charging sockets. This is a boon for travelers and gadget freaks that have a lot of devices that require to be charged. This is also useful when you have limited power sockets at home and you dont want to deal with the messy power strips or wired flex boxes ! Created By Madhukar Rupakumar https://techbytes-madhukar.com  https://krmadhukar.blogspot.com   Powercube adapter Amazon link - https://amzn.to/3Wax0ah   Usb A to C female converter from Wayona Amazon link - https://amzn.to/3Wax0ah My LinkTree -  https://linktr.ee/krmadhukar     Follow me on below Social media platforms: Youtube, Twitter, Instagram: krmadhukar  my FB page: https://www.facebook.com/https://www.facebook.com/MadhukarKRupakumar

My Amazon.in shopping | FireTV Stick 4K Max Unboxing & Overview

I went ahead & bought the Amazon FireTV stick 4K max in this season's Amazon great Indian festival sale. I have 2 televisions at home. One is the Google TV which is the latest software on a Sony 4K  KD-55X80AJ. The other one is a 43 inches Sony 4K TV with 200 Hz refresh rate which was a great purchase that continues to serve me very well till today since 6-7 years. However, its software had gone a bit old now it being Android TV. Hence I went ahead with this purchase. Checkout out more details about it in the video. Here is the link to buy the FireTV 4K Max.

Secrets of a successful presentation

1. Practice makes you perfect. If you want to improve your presentation skills, keep practicing, and do more presentations. 2. Your main objective of most presentations is to motivate the audience or convey the message/content you have created clearly. For this, you need to understand what the audience wants and deliver the content nicely to create an impression. 3. It is important to understand your audience and then deliver the content. Don’t deliver the content based on what you know, understand the audience, and prepare/tune/customize the content. 4. If you are meeting the executives, you should be ready with the elevator pitch. Every executive is different and you need to understand what they like, what they don’t like, and their priorities. Tune your content to meet the executive personality and needs. 5. When you structure the presentation, opening, messaging, and closing are the 3 phases. When you open the presentation, try and convey to the audience what is in it for...

Difference between Authentication & Authorization

Authentification can be defined as the verification of a claim of identity by a user, a process, or a device, often as a prerequisite to granting it access to resources within a system.  This can be done once or many times during a particular session, workday or other period of activity consisting of multiple steps & tasks. Authorization is the real-time decision that a system-issued identity claiming to have access rights to that system can be verified to be a (a) System-issued valid identity which is (b) being used or presented by the subject it has been issued to. Simply put, authentication is the process of verifying who someone is, whereas authorization is the process of verifying what specific applications, files & data a user has access to. courtesy: http://medium.com

Difference Between a Data Leak and a Data Breach

  A   data breach is the outcome of a planned cyber attack , but a data leak is the accidental exposure of sensitive data by a business. Cybercriminals do not create data leaks, they discover them and then use them to launch data breach attacks.   Data leaks tend to result from poor security practices. A business can also be impacted if any of its vendors have a data leak. Because these vulnerabilities occur throughout a vast attack landscape they’re difficult to detect and remediate before it’s too late.  Without a sophisticated data protection solution, businesses will remain vulnerable to data breaches through their third-party network. Courtesy - www.upgaurd.com 

[MacOS BigSur 11.4] Issue with Pulse Secure client on Apple Silicon based macbook M1 laptop

 If you happen to buy or get your hands on the Apple Macbook Pro M1 or Macbook Air M1 based on the Apple M1 silicon chip there are a few things that might be helpful if you need to connect to your corporate VPN network using Pulse Secure application. In my case, I did have my initial doubts if the pulse secure app will work successfully or not. My doubt turned out to be true and it did not work correctly out of the box. If you download the Intel-based Pulse Secure version 9.1.9  application from Pulse secure website or from your company website, the application will not be able to successfully connect to your corporate network. It will time out with a network error!! Googled out a bit & to my luck found this community post from Pulse Secure community website  https://community.pulsesecure.net/t5/Pulse-Connect-Secure/PSAL-failed-to-Launch-Java-Applet-MacOS-Catalina-10-15-4/m-p/45177/highlight/true#M28690   It turned out that you will need to install Oracle Java 25...

How to change the default pdf viewer application in your Mac or MacBook

  To  set  a  PDF viewer  as the  default  on  Mac  OS X: Select any  PDF  file from Finder. Control-click to open the menu. ...  Choose Get Info from the menu that opens. ...  From the Open with: section in the new window that opens, select your preferred application, such as Adobe  Reader  or Preview. ...  Click the  Change  All button.

Benq 3d Projector MX525 with Sony HT Blu-ray E3200 - Watching Avatar 3D & Titanic 3D

My idea of watching movies has always been on a big gigantic screen ever since my childhood. I cherish the 3d movies watched on the silver screen theatres starting right from the vintage Chota Chetan till the recent Avengers End Game!  My setup details With the pandemic striking in 2020 it has become a distant dream to watch these 3d movies again in theatres. Thankfully I have my Benq 3D projector MX525 to the rescue. My Benq 3D projector MX525 (Cost around Rs 30K) in combination with my Sony 3D Blu-ray home theatre BDV-E3200 (Cost 30K) creates the magic of the large theatre-like vision and the high fidelity sound output. The magic of the 3D is witnessed through the DLP 3D glasses from Hi-Shock/IT-Hub India(Cost Rs 2500 per pair). The 5x5 ft projector screen that I am using is from a company called Logic which cost me around 4K bought from SP road in Bangalore. The overall cost of the setup is about Rs 72,000/-  A word about Avatar The movie which brought 3D to the forefront i...